NetBSD 8.0 Security Advisories
Below is the list of advisories applicable to the NetBSD 8.0 release:
- NetBSD-SA2024-001 Inadequate validation of user-supplied hostname in utmp_update(8)
- NetBSD-SA2023-007 multiple vulnerabilities in ftpd(8)
- NetBSD-SA2023-006 KDC-spoofing in pam_krb5
- NetBSD-SA2023-005 su(1) bypass via pam_ksu(8)
- NetBSD-SA2023-003 Structure padding memory disclosures
- NetBSD-SA2023-002 Various compatibility syscall memory access issues
- NetBSD-SA2023-001 Multiple buffer overflows in USB drivers
- NetBSD-SA2022-004 procfs(5) missing permission checks
- NetBSD-SA2022-003 Race condition in mail.local(8)
- NetBSD-SA2022-002 Coredump credential reference count leak
- NetBSD-SA2022-001 PPPoE discovery phase memory corruption
- NetBSD-SA2019-004 IPv6 neighbor cache leak on expiration
- NetBSD-SA2019-003 Unprivileged user kernel stack disclosure in SIOCGIFCONF
- NetBSD-SA2019-002 Unprivileged kernel memory overwrite in mq_send(3)
- NetBSD-SA2019-001 Several kernel memory disclosure bugs
- NetBSD-SA2018-009 bozohttpd(8) can allow access to .htpasswd
- NetBSD-SA2018-008 Several vulnerabilities in NPF
- NetBSD-SA2018-007 Several vulnerabilities in IPSEC
- NetBSD-SA2018-006 Several vulnerabilities in the network stack
- NetBSD-SA2018-005 Privilege separation bug in Xen-amd64
- NetBSD-SA2018-004 Remote Memory Corruption in IPv6
- NetBSD-SA2018-003 Remote DoS in IPsec (IPv6)
- NetBSD-SA2018-002 Local DoS in virecover
- NetBSD-SA2018-001 Vulnerabilities in context handling